Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
July 13, 2022 | Attack Blogs
It's been more than six months since the Log4Shell vulnerability (CVE-2021-44228) was disclosed, and a number of post-mortems have come…June 29, 2022 | Disclosures
CVE-2022-28219 is an unauthenticated remote code execution vulnerability affecting Zoho ManageEngine ADAudit Plus, a compliance tool used by enterprises to…June 28, 2022 | Webinar Replays
In this session, Noah and his mentors will not only explore why the Kerberoasting attack technique is so pervasive and…June 28, 2022 | Webinar Replays
With the announcement of the addition of external penetration testing capabilities to NodeZero, Horizon3.ai is hosting a webinar to introduce…June 27, 2022 | Blogs
A new privacy study has found that 60% of states are moving toward new privacy laws. Implementation at the state…June 23, 2022 | Blogs
Horizon3.ai adds NodeZero app to Splunkbase to improve the effectiveness of your Splunk deployments and ensure you’re logging the right…June 17, 2022 | Customer Stories
NodeZero identified those critical few vulnerabilities that are actually exploitable, allowing us to maximize increased security with minimum effort.June 17, 2022 | Blogs
The FBI has warned that cybercriminals were selling stolen credentials information from higher education organizations on Russian hacker forums.June 14, 2022 | Blogs
Digital transformation of healthcare can lead to better treatments, improved outcomes, and reduced costs for healthcare organizations.June 14, 2022 | Customer Stories
As the Information Technology Security Officer for the City of St. Petersburg, FL, Brian Campbell is always on the lookout…